首页>
外国专利>
Last line of defense, guarantee and provide sufficient reliability / AUTH CODE
Last line of defense, guarantee and provide sufficient reliability / AUTH CODE
展开▼
机译:最后一道防线,保证并提供足够的可靠性/ AUTH CODE
展开▼
页面导航
摘要
著录项
相似文献
摘要
1.the computer u0441u043au043eu043du0444u0438u0433u0443u0440u0438u0440u043eu0432u0430u043du043du044bu0439 u0434u043bu00a0 u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 self checking the correctness of a processor; u043fu0430u043cu00a0u0442u044c, via the connected to the cpu; the verification of correctness. via the connected to the processor and u043fu0430u043cu00a0u0442u0438 and schema validation of accomplished with the computer and get the opportunity u043fu0440u043eu0432u0435u0440u00a0u0442u044c characteristics rect implemented with the possibility to limit the work computerwhen the validation fails.;2. computer 1, further containing a u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0 to u043eu043fu0440u0435u0434u0435u043bu0435u043du0438u00a0 interval u0434u043bu00a0 make the validate test rule computer u043bu044cu043du043eu0441u0442u044c characteristics during this interval.;3. computer 2, in which the interval u00a0u0432u043bu00a0u0435u0442u0441u00a0 one statistics, fixed and random.;4. computer 2, in which the validation occurs with increased frequency after the validation fails.;5. computer 1, which contains a cryptographic scheme to verify the correctness.;6. computer 1, in which the characteristic of u00a0u0432u043bu00a0u0435u0442u0441u00a0 one: digital manner signed program code, hash function, the range of action of u043fu0430u043cu00a0u0442u0438, u0438u0441u0442u0435u0447u0435u043du0438u00a0 u0432u0438u0442u0435u043bu044cu043du043eu0441u0442u0438 computer code, the cancellation of the digital signature, and the expiration date.;7. computer 1, further containing a u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0, responsive to the validation of the computer, u0434u043bu00a0 u043eu0433u0440u0430u043du0438u0447u0435u043du0438u00a0 functions when control rights u0438u043bu044cu043du043eu0441u0442u0438 fails.;8. computer 1, in which the processor contains a scheme to verify the correctness.;9.the validation of the computer, and the validation of contains a u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0; logic, via the connected to the pattern initiated u0438u00a0; and u043bu043eu0433u0438u0447u0435u0441u043au0430u00a0 scheme serves as a u0434u043bu00a0 verification scheme u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0, characteristics of the computer;via the connected to a verification scheme; the scheme u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0 in response to a signal from the logic circuit determines the characteristics of the operation of the computer.;10. the validation of the p.9, further u0441u043eu0434u0435u0440u0436u0430u0449u0430u00a0 cryptographic scheme, the u043bu043eu0433u0438u0447u0435u0441u043au0430u00a0 scheme u0432u0435u0440u0438u0444u0438u0446u0438u0440u0443u0435u0442 u0443u043fu043eu043cu00a0u043du0443u0442u0443u044e characterization using u00a0 u0443u043fu043eu043cu00a0u043du0443u0442u0443u044e cryptographic scheme.;11. the validation of the p.9, in which the u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0 limits performance by one of: periodic discharge, u0441u043eu043au0440u0430u0449u0435u043du0438u00a0 productivity the processor and an u0443u043cu0435u043du044cu0448u0435u043du0438u00a0 u0440u0430u0437u0440u0435u0448u0435u043du0438u00a0 u0434u0438u0441u043fu043bu0435u00a0.;12. the validation of the p.9, in which the u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0 contains one of the system clock and the random number generator.;13. the validation of the u00a0u0432u043bu00a0u044eu0449u0430u00a0u0441u00a0 p.9, resistant to interference from other components of the computer.;14.authentication method of computer, containing the following steps: providing a validation of the program to verify the correctness of information; the characteristics of the computer; a program to verify the correctness u0434u043bu00a0 revitalization through interval; u0432u044bu043fu043eu043bu043du00a0u044eu0442 check correctness of character u0438u0441u0442u0438u043au0438 computer; limit function computerwhen checking the characteristics of the computer fails.;15. a way to question 14, further containing a programming scheme to validate cryptographic secret.;16. way on p.14, which validate further contains verification in a random interval and the timing interval.;17. way on p.14, which validate further contains one of the verification of the digital signature function code and the verification of the hash functions u043fu0430u043cu00a0u0442u0438 range.;18. a way to question 14, further containing a registration u0442u0435u0440u043fu00a0u0449u0435u0439 failed verification of characteristics of computer and installation of u044du043du0435u0440u0433u043eu043du0435u0437u0430u0432u0438u0441u0438u043cu043eu0433u043e flag to be evaluated after u0440u0435u0441u0442u0430u0440u0442u0430 / reset the computer.;19. a way to question 14, in which the functions of the computer further includes limiting the number of communication messages.;20. a way to question 14, in which the functions of the computer additionally contains one: speed limit and restriction of access to sub set u0432u044bu043fu043eu043bu043du00a0u0435u043cu043eu0433u043e program code.
展开▼